It has been a few years since we last looked at single sign-on products, the field has gotten more crowded and more capable.

These days, the criminals often know more of our personal details than we know ourselves -- it's time to stop asking users for their personal details and to switch to more secure methods for authentication

A new threat dubbed MalumPoS is being used against businesses in the hospitality, food and retail industries, researchers said

Many companies have ghosts in their systems. Employees who've gone on to a better place -- say, with better pay -- but are still wandering through company files, cloud services, and social media accounts

A basic Whois query takes a few seconds but can provide the foundation for an investigation. However, it's often the data that does NOT reside in a Whois record that can be truly illuminating.

In a letter to the California Attorney General, Heartland Payment Systems has disclosed a data breach impacting personal information. The letter says that the data exposure is the result of a break-in at one of their offices, which...

Wordpress is a common target for criminals who redirect innocent users to malware download sites -- but a new type of malware steals user login credentials instead.

User Behavior Analytics, its advocates say, not only detect insider threats - it can predict them. That may bring comfort to organizational leaders, but critics say it raises privacy concerns for employees.

Gain insights on breach readiness, response and resiliency from Global 1000 enterprises with actionable recommendations for building a pre-emptive breach readiness and response program.

Mobile computing, cloud apps and tele-working have effectively made the de-perimeterization of IT security a “fait accompli”. In the process, these redrawn battle lines have created new challenges for CSOs and new points of entry for...

Many users never changed the password, thinking it was unique to them

All this week, Salted Hash is in San Francisco for the annual RSA Conference (RSAC). Each day we'll update the blog with breaking news and other details from the show. Today we're going to talk about passwords.

Learn why the right endpoint technology is critical to a successful security strategy, and see the 4 key elements to consider.

SPEAR, the research team at Cylance, has discovered new attack vectors for an 18-year-old vulnerability in Windows Server Message Block (SMB). The updated attack vector, called Redirect to SMB, impacts products from Microsoft, Apple,...

GoDaddy serves more than 13 million customers, who in turn place 59 million domains under the registrar's management. On Tuesday, my personal account at GoDaddy was compromised. The attacker was able to gain control over my account...

Does biometrics have a huge role to play in corporate security programs? We asked several experts to weigh in on the pros and cons of biometric security.

With the use of passwords coming under increased scrutiny, Microsoft is taking steps to move beyond them in Windows 10. Its biggest move: Joining the FIDO (Fast Identity Online) Alliance and adding support for the biometrics...